Cross Site Scripting Bug

Completed Posted Jun 10, 2009 Paid on delivery
Completed Paid on delivery

We are looking for someone to correct a cross site scripting bug. See the PCI Scan below. The url of the file is listed.

| TCP | | http/https | **4** | Possible cross site scripting on [[url removed, login to view] [url removed, login to view]][1] Use the following commands to verify this: wp --inject "[[url removed, login to view] [url removed, login to view] pt%3Ealert%28123%29%3C%2Fscript%3E&work_ex tn="][2] POST curl -L -k -d "checkbox1=Y%22%3E%3Cscript%3Ealert%28123 %29%3C%2Fscript%3E&work_extn=" "[[url removed, login to view] [url removed, login to view]"|][3] grep "123" This website may have other injection related vulnerabilities. |

We will provide you with the file mentioned in the URL, and we will upload it to our servers and run a PCI scan once it has been completed for the release of the payment.

If you have any questions let me know.

Ali

Engineering MySQL PHP Software Architecture Software Testing Web Hosting Website Management Website Testing

Project ID: #3933353

About the project

4 proposals Remote project Active Jun 11, 2009

Awarded to:

hexasoft

See private message.

$9 USD in 14 days
(10 Reviews)
2.6

4 freelancers are bidding on average $45 for this job

witscomputing

See private message.

$42.5 USD in 14 days
(400 Reviews)
6.8
netbee

See private message.

$85 USD in 14 days
(127 Reviews)
6.1
lehacf

See private message.

$42.5 USD in 14 days
(12 Reviews)
3.8